Agent-Oriented Novel Quantum Key Distribution Protocol for the Security in Wireless Networks

Xu Huang, Don Wijesekera, Dharmendra Sharma

    Research output: A Conference proceeding or a Chapter in BookChapter

    Abstract

    Wireless security is becoming increasingly important as wireless applications and systems are widely adopted. Numerous organizations have already installed or are busy in installing “wireless local area networks” (WLANs). These networks, based on the IEEE 802.11 standard, are very easy to deploy and inexpensive. Wi-Fi allows LANs to be deployed without cabling for client devices, typically reducing the costs of network deployment and expansion. As of 2007 wireless network adapters are built into most modern laptops. The price of chipsets for Wi-Fi continues to drop, making it an economical networking option included in ever more devices. Wi-Fi has become widespread in corporate infrastructures, which also helps with the deployment of RFID technology that can piggyback on Wi-Fi. Wi- Fi is a global set of standards, unlike mobile telephones, any standard Wi-Fi device will work anywhere in the world. Other important trends in wireless adoptions are including the introduction of wireless email with devices such as the Blackberry and The Palm VII, rampant digital cell phone use, including the use of short message service (SMWS), and the advent of Bluetooth devices. But the risks associated with the adoption of wireless networking are only now coming to light. A number of impressive attacks are possible and have been heavily publicized, especially in the IEEE 802.11b area. As far as base technology is concerned, wireless security appears to be following the usual “penetrate and path” route. Early wireless security focused almost exclusively on cryptography and secure transmission-with unfortunate results thus far. Wired Equivalency Privacy (WEP) security, the cryptography built in to 802.11b, for example, is completely broken and offers very little real security. In fact, one might argue that using WEP is worse than using no cryptography at all, because it can lull users into a completely unfounded sense of security. For every time one introduces new technologies one can rest assured that exploits for it are soon to follow. So with this in mind it was no great surprise that 64 bit WEP was quickly found to be lacking in terms of its implementation. So the vendors upped the ante and came out with 128 bit WEP, and this in turn was also found to be lacking. Wi-Fi hacking has been around for some time now, and oddly enough has really received little press. Since 2001, 64 bit WEP has been breakable [Park, Don 2006]. That was also around the time that well known tools such as Airsnort gave the ability to break into wireless network to the masses. In fact we looked at some of the tools that exist today which will allow user to discover wireless access points (WAP). It is obviously to face the fact that wireless network have become very popular over the past few years for not only business, but also the home market. In all likelihood user’s neighbors are probably running a wireless router for their home computer network even though it is not using a wireless card. The wireless communication revolution has been bringing fundamental changes to data networking, telecommunication, and has been making integrated networks a reality. By freeing the user from the cord, personal communications networks, wireless LAN's [IEEE Standard for Local Metropolitan area networks], wireless MAN’s, mobile radio networks and cellular systems, harbor the promise of fully distributed mobile computing and communications, any time, anywhere.
    Original languageEnglish
    Title of host publicationMultiagent Systems
    EditorsSalman Ahmed, Mohd Noh Karsiti
    Place of PublicationVienna, Austria
    PublisherIn-Tech
    Pages261-276
    Number of pages16
    Edition1
    ISBN (Print)9783902613516
    Publication statusPublished - 2009

    Fingerprint

    Quantum cryptography
    Wireless networks
    Network protocols
    Wi-Fi
    Cryptography
    Metropolitan area networks
    Telephone sets
    Personal communication systems
    Mobile computing
    Communication
    Bluetooth
    Electronic mail
    Ports and harbors
    Computer networks
    Wireless local area networks (WLAN)
    Radio frequency identification (RFID)
    Routers
    Local area networks

    Cite this

    Huang, X., Wijesekera, D., & Sharma, D. (2009). Agent-Oriented Novel Quantum Key Distribution Protocol for the Security in Wireless Networks. In S. Ahmed, & M. N. Karsiti (Eds.), Multiagent Systems (1 ed., pp. 261-276). Vienna, Austria: In-Tech.
    Huang, Xu ; Wijesekera, Don ; Sharma, Dharmendra. / Agent-Oriented Novel Quantum Key Distribution Protocol for the Security in Wireless Networks. Multiagent Systems. editor / Salman Ahmed ; Mohd Noh Karsiti. 1. ed. Vienna, Austria : In-Tech, 2009. pp. 261-276
    @inbook{693a860fa7844876aa3ccccc67422f25,
    title = "Agent-Oriented Novel Quantum Key Distribution Protocol for the Security in Wireless Networks",
    abstract = "Wireless security is becoming increasingly important as wireless applications and systems are widely adopted. Numerous organizations have already installed or are busy in installing “wireless local area networks” (WLANs). These networks, based on the IEEE 802.11 standard, are very easy to deploy and inexpensive. Wi-Fi allows LANs to be deployed without cabling for client devices, typically reducing the costs of network deployment and expansion. As of 2007 wireless network adapters are built into most modern laptops. The price of chipsets for Wi-Fi continues to drop, making it an economical networking option included in ever more devices. Wi-Fi has become widespread in corporate infrastructures, which also helps with the deployment of RFID technology that can piggyback on Wi-Fi. Wi- Fi is a global set of standards, unlike mobile telephones, any standard Wi-Fi device will work anywhere in the world. Other important trends in wireless adoptions are including the introduction of wireless email with devices such as the Blackberry and The Palm VII, rampant digital cell phone use, including the use of short message service (SMWS), and the advent of Bluetooth devices. But the risks associated with the adoption of wireless networking are only now coming to light. A number of impressive attacks are possible and have been heavily publicized, especially in the IEEE 802.11b area. As far as base technology is concerned, wireless security appears to be following the usual “penetrate and path” route. Early wireless security focused almost exclusively on cryptography and secure transmission-with unfortunate results thus far. Wired Equivalency Privacy (WEP) security, the cryptography built in to 802.11b, for example, is completely broken and offers very little real security. In fact, one might argue that using WEP is worse than using no cryptography at all, because it can lull users into a completely unfounded sense of security. For every time one introduces new technologies one can rest assured that exploits for it are soon to follow. So with this in mind it was no great surprise that 64 bit WEP was quickly found to be lacking in terms of its implementation. So the vendors upped the ante and came out with 128 bit WEP, and this in turn was also found to be lacking. Wi-Fi hacking has been around for some time now, and oddly enough has really received little press. Since 2001, 64 bit WEP has been breakable [Park, Don 2006]. That was also around the time that well known tools such as Airsnort gave the ability to break into wireless network to the masses. In fact we looked at some of the tools that exist today which will allow user to discover wireless access points (WAP). It is obviously to face the fact that wireless network have become very popular over the past few years for not only business, but also the home market. In all likelihood user’s neighbors are probably running a wireless router for their home computer network even though it is not using a wireless card. The wireless communication revolution has been bringing fundamental changes to data networking, telecommunication, and has been making integrated networks a reality. By freeing the user from the cord, personal communications networks, wireless LAN's [IEEE Standard for Local Metropolitan area networks], wireless MAN’s, mobile radio networks and cellular systems, harbor the promise of fully distributed mobile computing and communications, any time, anywhere.",
    author = "Xu Huang and Don Wijesekera and Dharmendra Sharma",
    year = "2009",
    language = "English",
    isbn = "9783902613516",
    pages = "261--276",
    editor = "Salman Ahmed and Karsiti, {Mohd Noh}",
    booktitle = "Multiagent Systems",
    publisher = "In-Tech",
    edition = "1",

    }

    Huang, X, Wijesekera, D & Sharma, D 2009, Agent-Oriented Novel Quantum Key Distribution Protocol for the Security in Wireless Networks. in S Ahmed & MN Karsiti (eds), Multiagent Systems. 1 edn, In-Tech, Vienna, Austria, pp. 261-276.

    Agent-Oriented Novel Quantum Key Distribution Protocol for the Security in Wireless Networks. / Huang, Xu; Wijesekera, Don; Sharma, Dharmendra.

    Multiagent Systems. ed. / Salman Ahmed; Mohd Noh Karsiti. 1. ed. Vienna, Austria : In-Tech, 2009. p. 261-276.

    Research output: A Conference proceeding or a Chapter in BookChapter

    TY - CHAP

    T1 - Agent-Oriented Novel Quantum Key Distribution Protocol for the Security in Wireless Networks

    AU - Huang, Xu

    AU - Wijesekera, Don

    AU - Sharma, Dharmendra

    PY - 2009

    Y1 - 2009

    N2 - Wireless security is becoming increasingly important as wireless applications and systems are widely adopted. Numerous organizations have already installed or are busy in installing “wireless local area networks” (WLANs). These networks, based on the IEEE 802.11 standard, are very easy to deploy and inexpensive. Wi-Fi allows LANs to be deployed without cabling for client devices, typically reducing the costs of network deployment and expansion. As of 2007 wireless network adapters are built into most modern laptops. The price of chipsets for Wi-Fi continues to drop, making it an economical networking option included in ever more devices. Wi-Fi has become widespread in corporate infrastructures, which also helps with the deployment of RFID technology that can piggyback on Wi-Fi. Wi- Fi is a global set of standards, unlike mobile telephones, any standard Wi-Fi device will work anywhere in the world. Other important trends in wireless adoptions are including the introduction of wireless email with devices such as the Blackberry and The Palm VII, rampant digital cell phone use, including the use of short message service (SMWS), and the advent of Bluetooth devices. But the risks associated with the adoption of wireless networking are only now coming to light. A number of impressive attacks are possible and have been heavily publicized, especially in the IEEE 802.11b area. As far as base technology is concerned, wireless security appears to be following the usual “penetrate and path” route. Early wireless security focused almost exclusively on cryptography and secure transmission-with unfortunate results thus far. Wired Equivalency Privacy (WEP) security, the cryptography built in to 802.11b, for example, is completely broken and offers very little real security. In fact, one might argue that using WEP is worse than using no cryptography at all, because it can lull users into a completely unfounded sense of security. For every time one introduces new technologies one can rest assured that exploits for it are soon to follow. So with this in mind it was no great surprise that 64 bit WEP was quickly found to be lacking in terms of its implementation. So the vendors upped the ante and came out with 128 bit WEP, and this in turn was also found to be lacking. Wi-Fi hacking has been around for some time now, and oddly enough has really received little press. Since 2001, 64 bit WEP has been breakable [Park, Don 2006]. That was also around the time that well known tools such as Airsnort gave the ability to break into wireless network to the masses. In fact we looked at some of the tools that exist today which will allow user to discover wireless access points (WAP). It is obviously to face the fact that wireless network have become very popular over the past few years for not only business, but also the home market. In all likelihood user’s neighbors are probably running a wireless router for their home computer network even though it is not using a wireless card. The wireless communication revolution has been bringing fundamental changes to data networking, telecommunication, and has been making integrated networks a reality. By freeing the user from the cord, personal communications networks, wireless LAN's [IEEE Standard for Local Metropolitan area networks], wireless MAN’s, mobile radio networks and cellular systems, harbor the promise of fully distributed mobile computing and communications, any time, anywhere.

    AB - Wireless security is becoming increasingly important as wireless applications and systems are widely adopted. Numerous organizations have already installed or are busy in installing “wireless local area networks” (WLANs). These networks, based on the IEEE 802.11 standard, are very easy to deploy and inexpensive. Wi-Fi allows LANs to be deployed without cabling for client devices, typically reducing the costs of network deployment and expansion. As of 2007 wireless network adapters are built into most modern laptops. The price of chipsets for Wi-Fi continues to drop, making it an economical networking option included in ever more devices. Wi-Fi has become widespread in corporate infrastructures, which also helps with the deployment of RFID technology that can piggyback on Wi-Fi. Wi- Fi is a global set of standards, unlike mobile telephones, any standard Wi-Fi device will work anywhere in the world. Other important trends in wireless adoptions are including the introduction of wireless email with devices such as the Blackberry and The Palm VII, rampant digital cell phone use, including the use of short message service (SMWS), and the advent of Bluetooth devices. But the risks associated with the adoption of wireless networking are only now coming to light. A number of impressive attacks are possible and have been heavily publicized, especially in the IEEE 802.11b area. As far as base technology is concerned, wireless security appears to be following the usual “penetrate and path” route. Early wireless security focused almost exclusively on cryptography and secure transmission-with unfortunate results thus far. Wired Equivalency Privacy (WEP) security, the cryptography built in to 802.11b, for example, is completely broken and offers very little real security. In fact, one might argue that using WEP is worse than using no cryptography at all, because it can lull users into a completely unfounded sense of security. For every time one introduces new technologies one can rest assured that exploits for it are soon to follow. So with this in mind it was no great surprise that 64 bit WEP was quickly found to be lacking in terms of its implementation. So the vendors upped the ante and came out with 128 bit WEP, and this in turn was also found to be lacking. Wi-Fi hacking has been around for some time now, and oddly enough has really received little press. Since 2001, 64 bit WEP has been breakable [Park, Don 2006]. That was also around the time that well known tools such as Airsnort gave the ability to break into wireless network to the masses. In fact we looked at some of the tools that exist today which will allow user to discover wireless access points (WAP). It is obviously to face the fact that wireless network have become very popular over the past few years for not only business, but also the home market. In all likelihood user’s neighbors are probably running a wireless router for their home computer network even though it is not using a wireless card. The wireless communication revolution has been bringing fundamental changes to data networking, telecommunication, and has been making integrated networks a reality. By freeing the user from the cord, personal communications networks, wireless LAN's [IEEE Standard for Local Metropolitan area networks], wireless MAN’s, mobile radio networks and cellular systems, harbor the promise of fully distributed mobile computing and communications, any time, anywhere.

    M3 - Chapter

    SN - 9783902613516

    SP - 261

    EP - 276

    BT - Multiagent Systems

    A2 - Ahmed, Salman

    A2 - Karsiti, Mohd Noh

    PB - In-Tech

    CY - Vienna, Austria

    ER -

    Huang X, Wijesekera D, Sharma D. Agent-Oriented Novel Quantum Key Distribution Protocol for the Security in Wireless Networks. In Ahmed S, Karsiti MN, editors, Multiagent Systems. 1 ed. Vienna, Austria: In-Tech. 2009. p. 261-276